‘CanisterWorm’ springs a destructive wiper attack targeting Iran
A new destructive worm, CanisterWorm, is targeting Iran by spreading through insecure cloud services and wiping data, marking a dangerous new trend.
OpenAI expands bug bounty to cover AI abuse and 'safety' concerns
OpenAI's bug bounty program now rewards researchers for finding AI safety vulnerabilities, shifting focus from traditional code flaws to complex issue
SANS report: The top 5 most dangerous new attack techniques are all powered by AI
For the first time, the SANS Institute's top five most dangerous attack techniques all have one thing in common: the weaponization of Artificial Intel
Chinese hackers caught deep within telecom backbone infrastructure
A Chinese state-sponsored actor named Unfading Sea Haze has compromised telecom backbones using advanced kernel implants for long-term espionage.
Intermediaries driving global spyware market expansion
Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a new study finds.
Iranian state hackers breached former official Kash Patel's email, FBI confirms
The FBI confirmed Iranian state-sponsored hackers compromised the personal email of former Trump official Kash Patel, part of a 2020 election interfer
FCC bans new foreign-made routers, citing supply chain and cyber risks
In a major escalation of its supply chain security strategy, the FCC has banned the import and sale of new, foreign-made consumer routers to mitigate
Security researchers sound the alarm on vulnerabilities in AI-generated code
A Georgia Tech study reveals over 100 CVEs linked to AI coding tools like GitHub Copilot, introducing a new vector for software vulnerabilities.
Poland's critical infrastructure under siege: Analyzing the surge in state-sponsored cyberattacks
As a key NATO ally, Poland faces an escalating wave of Russian-sponsored cyberattacks targeting its critical infrastructure, from railways to the ener
Enterprise cybersecurity software fails 20% of the time, warns Absolute Security
A new report finds 20% of enterprise security tools are failing due to poor patch management and IT complexity, leaving organizations dangerously expo
The FCC's router ban: A necessary security measure or the wrong fix?
The FCC put foreign-made consumer routers on its prohibited list to protect national security, but critics argue the ban creates a false sense of secu
Trivy hack spreads infostealer via Docker, triggers worm and Kubernetes wiper
A hypothetical supply chain attack on the Trivy security scanner via Docker Hub highlights a severe threat involving an infostealer, worm, and a Kuber











